Cited By
View all- Voelter MMolotnikov ZKolb BGray JSprinkle JTolvanen JRossi M(2015)Towards improving software security using language engineering and mbeddr CProceedings of the Workshop on Domain-Specific Modeling10.1145/2846696.2846698(55-62)Online publication date: 27-Oct-2015
- Diaz JArroyo DRodriguez F(2014)A formal methodology for integral security design and verification of network protocolsJournal of Systems and Software10.5555/2747476.274752989:C(87-98)Online publication date: 1-Mar-2014
- Aizatulin MGordon AJürjens JYu TDanezis GGligor V(2012)Computational verification of C protocol implementations by symbolic executionProceedings of the 2012 ACM conference on Computer and communications security10.1145/2382196.2382271(712-723)Online publication date: 16-Oct-2012